Apple's stance on these issues emerged post-Snowden, when the company started putting in place a series of technologies that, by default, make use of encryption to limit access to people's data.
苹果公司在这些问题上的立场是在斯诺登事件出现后形成的,在那之后,公司开始采用了一系列的技术,这些技术在默认情况下将使用者的数据加密,限制他人访问。
Network data encryption occurs if you enable the encryption on either side of a network connection.
只要在网络连接的某一端启用了加密,就会进行网络数据加密。
Fingerprint readers, onboard data encryption, and other hardware-based security features, now common on laptops, have yet to be incorporated in smartphones and other "post-PC" devices.
指纹识别器、板载数据加密,以及其他基于硬件的安全功能,现在在笔记本电脑上很普遍,但智能手机和其他“后pc”设备依然有待支持。
The key used for the data encryption could be the same key passed in the original request or another randomly generated key, the latter being more typical.
用于数字加密的密钥可能是在最初请求中传送的同一密钥,也可能是另一个随机生成的密钥,而后者更具代表性。
Most data encryption methods require explicit decisions of where and when to encrypt data, manual mounting and unmounting of encrypted images, and entering passwords.
大多数数据加密方法需要对在什么地方与什么时候对数据进行加密作出明确的决策、手动装入和卸载加密的映像,并输入相应的密码。
Further, 7zip also proffers its own format, featuring a higher compression ratio than any other scheme, gigantic capacity reaching into terabytes, and strong data encryption.
另外,7zip还提供自己的格式,这种格式的压缩率比任何其他方案都高,容量限制达到tb级,支持强大的数据加密。
The key used for the data encryption is encrypted itself using an asymmetric algorithm with the public key associated with the Service Provider's X.509 certificate.
用于数据加密的密钥是使用带有与服务提供者(Service Provider)的 X.509 证书相关联的公钥的非对称算法进行加密的。
In June, it bought PGP Corp and GuardianEdge, two privately held companies focusing on email and data encryption, for an undisclosed sum.
在6月,他们收购了PGP和GuardianEdge公司,两家专注于邮件及数据加密的私人所有公司,交易金额不详。
Rational ClearQuest 7.1 supports enhanced security by using Federal Information Processing Standard (FIPS) 140-2 approved data encryption algorithms.
RationalClearQuest 7.1通过使用联邦信息处理(FIPS) 140-2许可的数据加密规则,支持改善的安全性能。
Federal Information Processing (FIPS) 140-2 approved data encryption.
联邦信息处理(FIPS) 140-2许可的数据加密。
In addition to the encryptCompleteXmlFile method, I have now added the following two methods to service the encryption requirements of different types of data (encryption granularity)
除了encryptCompleteXmlFile方法,我现在添加了以下两个方法来为不同数据类型的加密要求(加密颗粒度)提供服务。
If the database is remote, for improved security it is recommended to configure the remote database connection to use data encryption - that is, turn on the data_encrypt configuration parameter.
如果数据库是远程的,那么为了提高安全性,建议为远程数据库连接配置数据加密—也就是,启用data_encrypt配置参数。
Step 4: Create an Encryptor object with a data encryption key, a key encryption key, their associated algorithms, and key information to be included in the output.
步骤4:利用一个数据加密密钥、一个密钥加密密钥、与这两个密钥相关联的算法、以及将来包含在输出信息中的密钥信息,根据它们来创建一个Encryptor对象。
The Enterprise edition adds more security through advanced auditing and transparent data encryption, and data warehousing with ColumnStore, compression, and partitioning.
企业版通过高级审计和透明数据加密功能为其增加了更高的安全性,还添加了拥有ColumnStore的数据仓库、压缩、以及分区。
For the J2ME-based Kerberos client, I'll only support one encryption algorithm, which is DES (data encryption standard) in CBC (cipher block chaining) mode.
对这个基于J2ME的Kerberos客户机,我将只支持一种加密算法,即CBC(密码分组链接cipher block chaining)模式下的DES(数据加密标准)。
Cryptography is sent by the general approach to data encryption to protect digital content before, the key given only to those legitimate users.
密码学的一般方式是在发送受维护数字内容之前对数据加密,仅把密钥给予那些合法的用户。
In fact, if you apply data encryption without consideration for how it will affect other it functions, it can actually increase risks in other areas of the enterprise.
实际上,如果你不考虑对其它IT功能影响地应用数据加密,实际上增加了企业其它区域的风险。
I must stress that data encryption is only one of the tools in a comprehensive Internet security setup.
我必须强调数据加密只是英特网综合安全设置中的一个工数据设置综合具。
The most main security technology of network system is data encryption, but RSA algorithm is the safest system of key systems.
网络系统最主要的安全技术是数据加密,而RSA算法是密钥系统最安全的一种体制。
Several encryption methods mentioned above, the location of data encryption is gradually close to the user, the protection ability is gradually enhanced.
以上所述的几种加密方式,数据加密的位置离用户是逐步靠近的,防护能力也是逐步提升的。
For more information about how to use FIPS 140-2 approved algorithms, see the Configure FIPS 140-2 approved data encryption section of the ClearQuest information Center.
如果您想得到关于怎样使用FIPS 140-2许可规则的更多信息,您可以查看ClearQuestInformation Center的配置FIPS 140 - 2许可的数据加密(data encryption)部分。
This is because RFB depends on Data Encryption Standard DES encoding, and us export restrictions effectively prevent Tcl from bundling DES.
这是因为RF B依赖于数据加密标准(Data Encryption Standard,DES)编码,并且美国的出口限制有效地阻止了Tcl捆绑DES。
AES is intended to be a stronger, more efficient successor to Triple Data Encryption Standard (3des), which replaced the aging DES, which was cracked in less than three days in July 1998.
AES预定为比三层数据加密标准(3des)更强、更高效的后续标准,3des替代了老化的DES加密标准,DES在1998年7月在不到三天的时间内就被破译了。
DES, the United States Data Encryption Standard, is a block cipher algorithm with 8-byte long blocks and a key length of 56 bits.
即美国国家数据加密标准(the United States Data Encryption Standard),是一个块密码算法,块长8字节,密钥长56位。
The fundamental principles and methods of data encryption based on Complex-Rotary Code are presented.
本文提出了利用复数旋转码进行数据加密的基本原理和方法。
Demonstrates how to encrypt and decrypt strings using the Data Encryption Standard algorithm.
演示如何使用数据加密标准算法来加密和解密字符串。
The data encryption transmission is realized between Client and Server. Furthermore key management is realized including generating, storing, deleting, modifying and searching of key.
实现了客户机与服务器间数据加密传输,同时实现了密钥的管理,包括密钥的生成、存储、删除、修改和查询。
Data Encryption feature secures your most sensitive files and folders.
数据加密特性使您最敏感的文件和文件夹。
Data Encryption feature secures your most sensitive files and folders.
数据加密特性使您最敏感的文件和文件夹。
应用推荐